Instruction-driven commercial password special processor system

A processor system, commercial encryption technology, applied in the architecture with a single central processing unit, electrical digital data processing, instruments, etc.

Pending Publication Date: 2021-01-22
ZHEJIANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In order to overcome the deficiencies of the prior art, the present invention aims at the national standard cryptographic algorithm of China, consider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction-driven commercial password special processor system
  • Instruction-driven commercial password special processor system
  • Instruction-driven commercial password special processor system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to more clearly illustrate the specific embodiments of the present invention or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the specific embodiments or the prior art.

[0046] refer to figure 1 and figure 2 , an instruction-driven commercial cryptographic processor system, designed corresponding instructions for the SM3 cryptographic hash algorithm, SM4 block cipher algorithm and ZUC Zu Chongzhi sequence algorithm announced by the State Cryptography Administration of China, and also pre-programmed for other new cryptographic algorithms. The coding space is reserved, and it has certain scalability.

[0047] available from figure 1 It can be seen in the figure that when the special processor for encryption and decryption needs to be woken up, the central processing unit needs to write the cryptographic algorithm configuration information into the control register of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the instruction-driven commercial password special processor system; a processor enters a main assembly line after receiving password configuration information, and an instruction fetching module starts to fetch an instruction from an internal instruction memory and sends the instruction to a decoding module; the decoding module carries out decoding according to a coding format of a customized instruction set, maintains a register file with variable length and bit width and sends a selection signal, an operation code and an operand to each special execution module facing encryption and decryption, and the data access module reads data from off-chip storage according to the grouping length and writes in an output result; the cryptographic operation module processes data in sequence according to the instruction decoding result and feeds forward and writes back an intermediate result, and the branch skip module judges to enter, continue or end iterative loop according to conditions. The invention is oriented to encryption and decryption algorithms, drives a special execution module through an instruction, provides a reasonable intermediate data scheme, can additionally add an execution unit, and flexibly supports more encryption and decryption algorithms.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit design and electronic information security, and specifically relates to a customized instruction set based on a Chinese national standard commercial encryption algorithm and its processor implementation. Background technique [0002] Since entering the 21st century, technology has changed with each passing day, information technology has developed rapidly, and people are living in the era of big data and the Internet of Things. The rise and popularization of emerging information storage and interaction methods such as mobile communications, e-commerce, smart medical care, and portable devices have brought great convenience, but at the same time, people are paying more and more attention to issues related to information security and communication risks. Cryptography technology is undoubtedly the foundation and core of reducing information security risks. [0003] The rise of modern cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/82G06F15/78G06F9/30
CPCG06F9/30007G06F9/3004G06F9/3005G06F15/7839G06F15/7878G06F15/82
Inventor 赵昀昊陈志坚
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products